sudo -i
sudo apt install tor
service tor start
service tor status
service tor start
service tor status
nano /etc/proxychains4.conf
In proxychains4.conf you want to uncomment 'dynamic_chain' and comment out 'strick_chain' and 'random_chain'.
You also want to uncomment 'Proxy DNS requests - no leak for DNS data' and 'proxy_dns'.
Then in the [ProxyList] section add the following two lines. All other proxys should be commented out.
socks4 127.0.0.1 9050
socks5 127.0.0.1 9050
Restart your machine and start the tor service.
service tor restart
Now you can start hunting. Note that if you start a browser, be sure to close all of its tabs and terminate it before running other command line tools.
proxychains Firefox www.google.com
proxychains nmap ...
proxychains sqlmap...
You can check your IP to confirm. This is the report from nordvpn.com/what-is-my-ip in Firefox without proxychains.
nordvpn.com/what-is-my-ip
proxychains firefox nordvpn.com/what-is-my-ip
Other site that report your IP include:
https://whatismyipaddress.com/
https://www.whatismyip.com/
https://www.iplocation.net/find-ip-address
https://www.ipvanish.com/what-is-my-ip-address/
You can also check from the command line.
curl https://ipinfo.io/ip
wget -qO- https://ipecho.net/plain ; echo
curl https://ipecho.net/plain
curl ifconfig.me
curl ipv4.icanhazip.com
Now check using proxychains. Restart tor and you get a new path.
proxychains curl https://ipinfo.io/ip
service tor restart
proxychains curl https://ipinfo.io/ip
More on Proxychains
To test
proxychains curl ifconfig.me/ip
If you get something different than your actual IP, then it is workkng.
Try capturing your traffic with tcpdump then analyze with wireshark.
open your web browser with proxcychain command
proxychains firefox
and then go to this webpage
https://www.dnsleaktest.com/
if it shows u different location, it means it is working. u can also click on test button and see more details.
make sure that your dns server also changed
Or,
proxychains firefox www.whatsmyip.org
proxychains firefox www.dnsleaktest.com
proxychains firefox nordvpn.com/what-is-my-ip
proxychains firefox ip.me
proxychains firefox www.whatismypublicip.com
host -4 myip.opendns.com resolver1.opendns.com
proxychains curl ifconfig.me
proxychains curl icanhazip.com
proxychains curl ipecho.net/plain
proxychains curl https://diagnostic.opendns.com/myip
proxychains curl ident.me
proxychains curl ipecho.net/plain
proxychains dig TXT +short o-o.myaddr.l.google.com @ns1.google.com | awk -F'"' '{ print $2}'
Harvest select proxies from the above site and use Libracalc and sublime to create a tmp file that contains the proxies in the proxychain format (protocol ip port) all lower case.
Note how to set the configuration file (/etc/proxychains4.conf)>
proxychains sudo nmap -sT -p 80 HQ.info
proxychains sudo nmap -sT -PO -p 80 HQ.info
proxychains sudo nmap -sT -PO -p 80 thepurplefiles.com
host thepurplefiles.com
sudo nc.traditional -vv -n 162.241.225.36 80
GET / HTTP/1.0
proxychains nmap -sT -p 80 162.241.225.36
proxychains nmap -sT -p 443 162.241.225.36
host HQ.info